首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4篇
  免费   0篇
  2018年   1篇
  2015年   2篇
  2014年   1篇
排序方式: 共有4条查询结果,搜索用时 8 毫秒
1
1.
In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted.  相似文献   
2.
This article fills the gap in existing scholarship on asymmetric conflict, indigenous forces, and how socio-cultural codes shape the dynamics and outcomes of conflict transformation. Specifically, it identifies three key socio-cultural values commonplace in honorific societies: retaliation, hospitality, and silence. As sources of effective pro-insurgent violent mobilisation and support from among the local population, these values provide insurgents with an asymmetric advantage over much stronger incumbents. Using the case studies of the two Russian counterinsurgencies in Chechnya, the article shows the mechanisms on the ground through which Moscow’s deployment of indigenous forces against insurgents helped to stem the tide of conflict, reversing the insurgents’ initial advantage in terms of asymmetry of values.  相似文献   
3.
While terrorist and insurgent groups have often combined anti-state subversion with ‘purely‘ criminal activities in order to obtain the financial means to wage their ideological struggle, little is known about the transformation of such groups into non-ideological organised crime groups (OCG) with close links to authorities. This holds particularly for jihadist groups that have on ideological grounds ruled out collaboration with their archenemies – ‘infidels’ and ‘apostates’. Using unique ethnographic data from Russia’s Dagestan, this article explores the causes and contexts of the gradual transformation of some of Dagestan’s jihadist units – jamaats – into organised crime groups collaborating with local authorities.  相似文献   
4.
Up to the present, there is only very little research on how the population perceives terrorism and its threats, even though support from the population is crucial for effective counterterrorism. By eliciting beliefs and subjecting them to content analyses, six factors were found that determine the protection worthiness of a target in the people's view: the potential damage to “people,” “symbolism,” “economy,” “politics,” “nature,” and “image/publicity.” These empirically found factors are in line with factors specified by terrorist target selection models. They differ in the strength of their cognitive representation among participants and, thus, their subjective importance to the people. The first three factors are shared among all participants, whereas the latter ones could only be found in a part of the participant sample. People's judgments of the targets' protection worthiness differ substantially from their judgments of the targets' attractiveness to terrorists, even though the same factors seem to be involved. This study offers an insight into the people's mental model about protection worthiness of targets. Together with classical risk analysis and knowledge about terrorists, these results can form a basis for setting up a holistic scheme for critical infrastructure protection.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号